Check: WN11-00-000010
Microsoft Windows 11 STIG:
WN11-00-000010
(in versions v2 r2 through v1 r1)
Title
Windows 11 domain-joined systems must have a Trusted Platform Module (TPM) enabled. (Cat II impact)
Discussion
Credential Guard uses virtualization-based security to protect information that could be used in credential theft attacks if compromised. There are a number of system requirements that must be met in order for Credential Guard to be configured and enabled properly. Without a TPM enabled and ready for use, Credential Guard keys are stored in a less secure method using software.
Check Content
Verify domain-joined systems have a TPM enabled and ready for use. For standalone systems, this is NA. Virtualization-based security, including Credential Guard, currently cannot be implemented in virtual desktop implementations (VDI) due to specific supporting requirements including a TPM, UEFI with Secure Boot, and the capability to run the Hyper-V feature within the virtual desktop. For VDIs where the virtual desktop instance is deleted or refreshed upon logoff, this is NA. Verify the system has a TPM and is ready for use. Run "tpm.msc". Review the sections in the center pane. "Status" must indicate it has been configured with a message such as "The TPM is ready for use" or "The TPM is on and ownership has been taken". TPM Manufacturer Information - Specific Version = 2.0 If a TPM is not found or is not ready for use, this is a finding.
Fix Text
For standalone systems, this is NA. Virtualization-based security, including Credential Guard, currently cannot be implemented in virtual desktop implementations (VDI) due to specific supporting requirements including a TPM, UEFI with Secure Boot, and the capability to run the Hyper-V feature within the virtual desktop. For VDIs where the virtual desktop instance is deleted or refreshed upon logoff, this is NA. Ensure domain-joined systems must have a TPM that is configured for use. (Versions 2.0 support Credential Guard.) The TPM must be enabled in the firmware. Run "tpm.msc" for configuration options in Windows.
Additional Identifiers
Rule ID: SV-253255r971547_rule
Vulnerability ID: V-253255
Group Title: SRG-OS-000424-GPOS-00188
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002391 |
Monitor organization-defined system resources to determine if sufficient resources exist to prevent effective denial-of-service attacks. |
CCI-002421 |
Implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission. |